CYberskills – Cyber career Roadshow

Fall 2022 | 4 Universities| AAU-CPH | CBS | AU | SDU

This coming fall you can meet us at one of the 4 Universities, who are part of our “cyber roadshow”

Our goal is to let you explore if a career in cyber security could be an interesting path for you!

Cyber Security – Let’s show you why it might be an interesting career path for you!

Pursuing a career in cyber security means joining a booming industry where available jobs outnumber qualified candidates.  People working with security have a range of different backgrounds and educations. Yet, they all have one thing in common, they think cyber security is fun, challenging and exciting to work with – and we want to show that to you!

In cooperation with Microsoft, IDA, ICY Security, IT-Vest and CyberSkills – we have created a small roadshow across 4 universities to spread the word about cyber security (AU, AAU-CPH, CBS & SDU)!

It’s the same 2,5 hours program for all of the 4 events – you just have to sign up for the right location through the boxes below.

If you can’t wait on getting wiser on the topic, you can also dive into a line of our rolemodels, and watch our 3 cyber security modules, then you get all the right fundamentals in place 😉

 

Join our CyberSkills career event in the Fall

Throughout the 2,5 hours event, we want you that cyber security is fun, challenging and exciting to work with. It’s the same event at 4 different universities with different speakers, and we hope that you will join!

The event will show you:

  • What skills are needed to do a career in cyber?
  • Give you insights on different career paths within the field
  • Hands-on experience through small workshops learning the basics 

We will host 2 workshops (running parallel), and you have to choose whether you want to join the “technical” or “privacy” oriented.

The event will give you the opportunity to talk and network with like-minded peers and the companies we have engaged!

So come join us at one of the 4 universities, and maybe you will find out that you should pursue a career in cyber security as well.

Event program

14:50
Arrival & Registration
15:05
Welcome

By our Host of the day Linda M. Pedersen, Partner, Happy42

15:10
Opening keynote

By Microsoft: Why diversity is our strongest defense in cybersecurity?

15:25
Career Pep Talks

We have invited a graduate to talk about how they have experienced the career path in cyber security – and why we reccomend you to do the same!

15:40
Workshop Intro: Personal threat modelling: How to mitigate risks hosted by Microsoft (AU / AAU-CPH / SDU / CBS)

In this workshop you will learn how to threat model, by creating threat a model for you!

15:45
Workshop Intro: How to Put a Hacker in a Leg-log hosted by ICY (AU // AAU-CPH)

Get ready for a wicked cocktail of hacker attacks, Pandora’s Box, real life cyber-crime case

Workshop Intro: How to work with Privacy and IAM by VENZO (SDU // CBS)

Get ready for a fly-in on how you work with privacy from a cyber security perspective.

15:50
You need to choose one of the 2 workshops, that you would like to attend!

Your time to choose which one you want to attend! Please note that Microsoft will host workshop at all 4 places, ICY will host their workshop at AU and AAU-CPH and VENZO will then host at SDU and CBS. So you can choose between 2 no matter what location 🙂

16:10
Workshop begins

Common for all, is that it will be low-key workshopa that focuses on fundamentals within the given topic (70 minutes)! We make sure that everyone is comfortable in the setting 🙂

17:20
End of workshop, networking & round off
17:45
Thank you for attending!

Workshops description

Personal threat modelling: How to mitigate risks

Hosted by Microsoft

(AU | AAU-CPH | SDU| CBS)

Threat modeling is one of the most important tools used by security and software development teams across the world. It enables those teams to identify, and mitigate, threats to the systems and data they are protecting. In this workshop you will learn how to threat model, by creating threat a model for you!

We will show you how to identify your most important assets – e.g., your money, your reputation, your pictures, your safety – then show you how to improve the security of these assets using threat modelling to generate a list of prioritized risks and a mitigations.

How to Put a Hacker

in a Leg-log

Hosted by ICY

(AU | AAU-CPH)

Get ready for a wicked cocktail of hacker attacks, Pandora’s Box, real life cyber-crime case and a Kahoot quiz with a chance to win cool prizes.

On this workshop we have one goal: To show how you – together with all of us here at ICY Security – can help making life miserable for the increasing number of criminals, roaming in cyberspace.

So, buckle up and experience first-hand, how our ethical hacker will go after valuable data and then show you, how to shut down the attack with force!

Privacy Workshop

Hosted by VENZO_cyber security

(SDU | CBS)

Full description will be announced soon.

Registration

AU

03 October

Aarhus

AAU-CPH
04 October

Copenhagen

SDU

05 October

ODENSE

CBS

22 November

Copenhagen

People Involved

Linda M. Pedersen

Facilitator

Partner Happy 42

Peter Melsted Hansen

Principal Consultant & Ethical Hacker

ICY Security

Marcus Tanghøj

Senior Consultant

ICY Security

Jesper Bak Engel

 Senior Consultant & Product Manager

ICY Security

Rhianon Samuel

Cybersecurity Consultant

Implement

Jacob Bech

IT-sikkerhedsspecialist

TDC Net

Eunice Munthali

Senior Privacy Manager

Microsoft

Aline Harmand

Cloud Security Architecht

Microsoft

Jonathan Davis

Principal Security Program Manager

Microsoft

Alexander Nissen

Student, MS Datalogi, SDU

Team Member at Kalmarunionen

 

Mogens Hede Villumsen

Cloud Security Consultant

Bankdata

 

Maja Øvlisen

GRC Specialist

Norlys Fibernet

Johanne Hauser

Identity and Access Management Student Assistant

VENZO_cyber security

Hjortur Palmi Palsson

Security Analyst

VENZO_cyber security

 

Wael AbuSeada

Senior Software Engineer

Microsoft

 

Partners